Across
- 4. Malware analysis that involves running the program in a controlled environment.
- 5. Attackers use username and password pairs from old breaches to access new accounts.
- 6. Gateways that provide services to inside users while protecting hosts from outside users.
- 9. Free software framework for scanning and managing known security vulnerabilities.
- 11. The process of configuring a honeypot with attractive data and apparent vulnerabilities.
- 13. Formal process of technical evaluation for a system's or individual's security effectiveness.
- 14. Forensic data layer containing file timestamps, size, author, and geolocation details.
- 16. Cybersecurity threat that employs social engineering and masquerading as a trustworthy entity to acquire sensitive data.
- 17. Malicious digital communication causing emotional harm.
- 19. Security applications used to analyze captured network traffic for evidence of network-based attacks and unauthorized activity.
- 20. Security analysis technique that looks for statistical deviations from a security baseline
Down
- 1. Machine learning model used in threat hunting to find correlations in data.
- 2. Network security appliances that act as a barrier between trusted and untrusted networks.
- 3. Weaknesses in a system arising from human actions or behaviors, like weak passwords.
- 7. Extortion-based threat where malicious code denies access to data until a sum is paid.
- 8. Formal and systematic security assessment and assurance process for a computer system.
- 10. Tools that protect systems by detecting and eliminating a wide range of malicious software.
- 12. Security mechanism that monitors a network or system for malicious activity or policy violations and reports them.
- 15. Risks arising from individuals who misuse authorized access to compromise data or cause harm.
- 18. Social engineering technique that offers something enticing like free software containing malware.
